{"title":"PCAD:无线传感器网络中的功率控制攻击检测","authors":"U. Prathap, P. D. Shenoy, K. Venugopal","doi":"10.1109/ANTS.2016.7947798","DOIUrl":null,"url":null,"abstract":"Security in wireless sensor networks is critical due to its way of open communication. In this paper we have provided a solution to detect malicious nodes which perform radio transmission power control attack and sinkhole attack in wireless sensor networks. In the proposed approach, data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node in the beginning of the round for forwarding the packet towards sink. Each node adds its identity in the packet as a routing path marker and encrypts before forwarding to parent. Child node observes the parent, handles acknowledgement from 2-hop distance node and decides the trust on parent based on successful and unsuccessful transactions. Each node sends a trust value report via multiple paths to Sink at the end of the round. Sink identifies the malicious node by comparing trust value report received from each node with number of data packets received. Simulated the algorithm in NS-3 and performance analysis compared with other recently proposed approach. Simulation results show that proposed method detect the malicious nodes efficiently and early.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"PCAD: Power control attack detection in wireless sensor networks\",\"authors\":\"U. Prathap, P. D. Shenoy, K. Venugopal\",\"doi\":\"10.1109/ANTS.2016.7947798\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security in wireless sensor networks is critical due to its way of open communication. In this paper we have provided a solution to detect malicious nodes which perform radio transmission power control attack and sinkhole attack in wireless sensor networks. In the proposed approach, data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node in the beginning of the round for forwarding the packet towards sink. Each node adds its identity in the packet as a routing path marker and encrypts before forwarding to parent. Child node observes the parent, handles acknowledgement from 2-hop distance node and decides the trust on parent based on successful and unsuccessful transactions. Each node sends a trust value report via multiple paths to Sink at the end of the round. Sink identifies the malicious node by comparing trust value report received from each node with number of data packets received. Simulated the algorithm in NS-3 and performance analysis compared with other recently proposed approach. Simulation results show that proposed method detect the malicious nodes efficiently and early.\",\"PeriodicalId\":248902,\"journal\":{\"name\":\"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"volume\":\"180 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTS.2016.7947798\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2016.7947798","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
PCAD: Power control attack detection in wireless sensor networks
Security in wireless sensor networks is critical due to its way of open communication. In this paper we have provided a solution to detect malicious nodes which perform radio transmission power control attack and sinkhole attack in wireless sensor networks. In the proposed approach, data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node in the beginning of the round for forwarding the packet towards sink. Each node adds its identity in the packet as a routing path marker and encrypts before forwarding to parent. Child node observes the parent, handles acknowledgement from 2-hop distance node and decides the trust on parent based on successful and unsuccessful transactions. Each node sends a trust value report via multiple paths to Sink at the end of the round. Sink identifies the malicious node by comparing trust value report received from each node with number of data packets received. Simulated the algorithm in NS-3 and performance analysis compared with other recently proposed approach. Simulation results show that proposed method detect the malicious nodes efficiently and early.